Outschool
開啟貨幣、時區和語言設置
登入

法證科學:密碼學與網路犯罪

在這個為期 10 週的課程中,學生將學習各種程式碼編寫和破解技術以及用於調查網路犯罪的方法。 #學術的
Thomas Jones
平均評分:
4.9
評論數量:
(1,218)
班級

包含什麼

10 現場會議
10 上課時間
作業
每週 1 小時. Students will have the opportunity to solve short ciphers and coded messages between class sessions. I will provide the encoded messages which I will create with the methods we discuss in class. This work is not graded, unless families choose to have a graded option.
評估
Learner progress is generally assessed through informal assessment of participation in discussions (including chat involvement). For families who want or need a letter grade, I will provide an option to do that.
評分
包括
我們無法翻譯此文,請刷新頁面並再試一次。

課堂經歷

英語程度 - 未知
美國 8 - 11 年級
Beginner 等級
Forensic Science 5 will focus heavily on cryptology from ancient methods, which seem almost mystical, to modern computer-based double-encryption systems.  With each code-making approach, students will have the opportunity to use known techniques and suggest variations to add complexity.  I will provide small sections of coded messages, with hints about methodologies used, so that the students can try their hands at deciphering each hidden message.  Along the way, we will cover encoded messages from real cases, with emphasis on the massive body of ciphers and coded messages from the Zodiac case, which students who have taken previous installments of my Forensic Science series know is my specialty.  After completing an overview of historical and modern cryptologic techniques, we will shift gears and examine methods of investigating cyber crimes.  Interwoven in the course will be cipher-based mock crime.

Topics (one week each) will include:
1.  Ancient cryptologic methods and concepts, including gematria, temurah (particularly the atbash cipher), notarikon, and isopsephy.
2.  Pre-modern techniques of the simple kind, including grid-based ciphers, rigid alphabet rearrangement, created symbols, and attempts to appear magical.
3.  Pre-modern techniques of the complex kind, including cipher wheels, early substitution OR transposition ciphers, alphanumeric codes, mixing numbers of digits, creating symbols and sigils.
4.  The small ciphers, old and new: one-time pad encryptions, short bursts of enciphered text, and figurate expressions.
5.  Approach to solving substitution ciphers.
6.  In-class ciphers to solve (4 weeks)
7.  Investigation of cyber crimes: methods and agencies involved in the analysis of computer-based crimes, from low-level hacking, to large-scale ransomware attacks and international cyber attacks aimed at power grids or government structures.

Teaching methods and class structure:  As with my other forensic science classes, this class will focus on the Socratic Method.  I will provide materials and images and lead discussions aimed at fostering critical and analytical thinking.  Cryptology is a particularly appropriate subject when working on expanding one's thinking.  I am very laid back, and encourage my students to feel confident in their own ideas.  

All students will have extensive opportunities to interact with me and with other students.  Discussion will be a cornerstone of our exploration of the topics covered.

Required experience:  None, quite simply.  Students do not have to have completed any of the previous Forensic Science classes in the series.  They are numbered, but they each cover distinct topics within the field.

學習目標

Students will learn about a wide variety of code-making techniques, ranging from ancient uses of images and numbers to modern complex encryptions.
學習目標

教學大綱

10 課程
超過 10 週
課 1:
Ancient Cryptology
 Methods include Gematria, Temurah, and Notarikon.  We will work through a few simple codes using these methods. 
60 分鐘線上直播課
課 2:
Simple Pre-modern Techniques
 Grid-based ciphers, rigid alphabet substitution, created symbols, and attempts to appear magical. 
60 分鐘線上直播課
課 3:
Complex Pre-modern Techniques
 Cipher wheels, early substitution OR transposition ciphers, alphanumeric codes, and sigils. 
60 分鐘線上直播課
課 4:
Small Ciphers
 One-time pad encryptions, short bursts, figurate expressions. 
60 分鐘線上直播課

其他詳情

父母的引導和規範
While we will talk about ciphers from real criminal cases, we will not cover any graphic or inappropriate content from any cases.
外部資源
學習者無需使用標準 Outschool 工具以外的任何應用程式或網站。
來源
While it is not required for class, students who are highly interested in cryptology may want to get a copy of David Kahn's "The Codebreakers." This should be available at many libraries. It has many editions, and I have gotten an older copy (which was a goldmine for a cryptologic analysis I completed). Again, though this is not required.
已加入 January, 2017
4.9
1218評論
教師檔案
教師專業知識和證書
法學博士 由 University of Michigan
While we do not cover a sensitive topic, I do want to discuss my expertise.  I have been teaching forensic science up through the college level since 2005, and have been heavily involved in cryptologic analysis for roughly 7 years.  In February of 2022, I submitted an exhaustive cryptanalysis of the entire body of Zodiac writings to the FBI for review.  Based on this work, which has never been completed previously, I believe it is reasonable to state that I am the leading expert of the Zodiac's use of ancient cryptologic techniques.

評論

現場團體課程
分享

US$140

用於 10 課程
每週1次,共 10 週
60 分鐘

有72 位學習者完成此課程
即時視訊會議
年齡: 12-17
3-17 每班學員人數

關於
支援
安全隱私加州隱私學習者隱私您的隱私選擇條款
下載這個軟體
在應用程式商店下載在 Google Play 上取得
© 2025 校外